DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

Similar documents
Deloitte Discovery Caribbean & Bermuda Countries Guide

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop

Fundamental Concepts and Models

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Granted: The Cloud comes with security and continuity...

Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida

CHEM-E Process Automation and Information Systems: Applications

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Introduction To Cloud Computing

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

FAST TRACK YOUR AMAZON AWS CLOUD TECHNICAL SKILLS. Enterprise Website Hosting with AWS

Clouds in the Forecast. Factors to Consider for In-House vs. Cloud-Based Systems and Services

BHConsulting. Your trusted cybersecurity partner

VMware BCDR Accelerator Service

Cisco Services: Towards Your Next Generation IT

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Data Security: Public Contracts and the Cloud

SQA Advanced Unit specification: general information for centres

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

Kroll Ontrack VMware Forum. Survey and Report

Cloud solution consultant

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.

Cloud solution consultant

ITP 140 Mobile Technologies. Mobile Topics

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

MANAGED CLOUD SERVICES

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Digital Forensic Approaches for Amazon Alexa Ecosystem

Cloud Computing Overview. The Business and Technology Impact. October 2013

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

DROPBOX.COM - PRIVACY POLICY

Best Practices in Securing a Multicloud World

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups.

ITP 342 Mobile App Development. APIs

Accelerate Your Enterprise Private Cloud Initiative

The Use of Technology to Enhance Investigation

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

UFED Cloud Analyzer. Traces and changes. February Version 6.0

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

How Credit Unions Are Taking Advantage of the Cloud

CLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa

DHS Cloud Strategy and Trade Nexus. May 2011

MinutePad FAQs. Effective Meeting Software by. Tel: +44 (0)

BHConsulting. Your trusted cybersecurity partner

Angela McKay Director, Government Security Policy and Strategy Microsoft

EY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

INFS 214: Introduction to Computing

Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017

FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users. Contents

Version 1/2018. GDPR Processor Security Controls

Cyber Security: Are digital doors still open?

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

DATA BREACH NUTS AND BOLTS

CipherCloud CASB+ Connector for ServiceNow

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

HCA Tech Note 500. HCA Cloud Account (as of 29-May-2017) Do I need a Cloud Account?

Credit Card Data Compromise: Incident Response Plan

Drive digital transformation with an enterprise-grade Managed Private Cloud

Understanding Computer Forensics

Financial Forensic Accounting

RippleMatch Privacy Policy

How to avoid storms in the cloud. The Australian experience and global trends

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD?

Cyber Crime Seminar 8 December 2015

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform

How Secure is Blockchain? June 6 th, 2017

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Trends in Mobile Forensics from Cellebrite

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Michael Phelps Foundation: Privacy Policy

PATRIOT CAMPERS PTY LTD PRIVACY POLICY

Accelerate Your Cloud Journey

Cloud & Virtualization Technologies

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

A revolutionary visual security and analytics solution

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Discussion on MS contribution to the WP2018

Privacy hacking & Data Theft

Level 4 Diploma in Computing

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

Cloud Computing Context. Image: T. Sridhar

BIG DATA ANALYTICS IN FORENSIC AUDIT. Presented in Mombasa. Uphold public interest

Driving Business Outcomes: Cisco Data Center Innovation and Solutions

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

Information Security Incident Response Plan

Office 365: Fact Sheet

AT&T and Small Cells. Enhancing our network to meet consumer demand today while preparing for the technologies and innovations of tomorrow.

Market Trends in Public Cloud Storage

COMPUTACENTER AND CITRIX TOGETHER

Certified Cyber Security Analyst VS-1160

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

Transcription:

Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017

DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au Briston Talbot Associate Director Office: (08) 8223 8114 Mobile: 0439 806 906 Email: btalbot@duncanpowell.com.au Peter has been overseeing the Forensic department since June 2014, he has over 33 years accounting experience, four of which were in commerce with a major Australian firm. Since 1987 he has specialised in corporate insolvency with several established firms. Peter thrives on the challenges his profession provides and has developed wide ranging industry knowledge including specialty areas such as education and indigenous affairs. He has proven skills in both formal and informal insolvency appointments and has conducted reviews for major Australian banks and financiers as well as providing consulting services to a number of government departments and major corporate entities. He has extensive experience in investigating and analysing the affairs of both solvent and insolvent companies, the quantification of losses or damages for legal claims and acting as an expert in litigation matters. Briston is responsible for the management and delivery of Forensic Technology services, including computer forensics and e-discovery and has over nine years experience in accounting and restructuring matters and five years experience in providing Forensic Technology and investigative services. Briston s restructuring experience includes the review, investigation and restructure of organisations from small business owners to publicly listed organisations on behalf of secured lenders, creditors and stakeholders. He strives to work with stakeholders and organisations to achieve the best possible outcome for all. During his career, Briston has also been responsible for the investigation of computer based information which includes the forensic investigation of corporate fraud, financial crime and intellectual property (IP) theft. This has included supporting investigations of regulatory bodies and the DuncanPowell restructuring team through the acquisition and analysis of forensic images.

Today The Cloud What is it? What does it look like? Service Levels Organisational structure The result of the cloud Scenario Where is the information Why is this good for an investigation Evidence collection possibilities Limitations How can computer forensics help Questions

The cloud what is it? In simple terms, Cloud computing is using the internet to access someone else's software running on someone else's hardware in someone else's data centre.

So what does this look like? Software Internet USER Hardware Data Centre

Three service levels for cloud computing SAAS Software as a Service (SaaS) A user uses software applications made available from a cloud provider. Usually the user interacts with SaaS applications using a web-browser. An example of SaaS is the Google Apps suite offered by Google. Users can use the suite to deploy email, make use of Google Docs and Calendar. All data generated by the use of the applications is stored in the cloud Software (1+2) Hardware Data Centre = + +

Three service levels for cloud computing PAAS Platform as a Service (PaaS) Application programming interface (API) for users to create and host custom-built or bought applications. An example of PaaS is Microsoft Azure or Amazon Web Services Software (1) Software (2) Hardware Data Centre = + + +

Three service levels for cloud computing IAAS Infrastructure as a Service (IaaS) Is the leasing of virtualised computing resources such as processing power, volatile memory and persistent storage space to host virtual machines. Software (1+2) Hardware Data Centre = +

Organisational deployment Private cloud The infrastructure is operated solely by the organisation who owns the cloud. Community cloud Is shared between several organisations Public clouds Will usually be owned by a provider organisation, which will maintain the cloud facilities in one or more corporate data centres. The administrative control of the cloud resources will therefore reside with the provider, rather than the user. Hybrid cloud Is a composition of two or more of the above deployment options

The result of the cloud Internet USER v1.0 Software Internet Hardware USER v2.0 Data Centre

User v2.0 Presents a security issue. Replicate: Subject to legal implications with username and password you could access User v1.0 information. Which could include: Emails Social media Photos Full backups of mobiles, tablets and laptops Bank details Thoughts around two step verification

Scenario

Scenario

Scenario

So where is the information?

So where is the information? USER Software Internet Hardware Data Centre

So why is the cloud good news for an investigation? Nobody likes losing information so what do we do?

Plus

Default backups Google Drive icloud - can go to your icloud: www.icloud.com Dropbox

Collection possibilities Personal items Cloud information

Cloud - the door to other issues and possibilities Rise of IOT Brings about the possibility of other evidence items to consider: Samsung SMART TV SMART globes Voice digital home assistant Security issues with voice recordings switch lights on and off Google Home, Amazon Echo (still to come in AUS) and Apple speaker (still to come in AUS) unsecured devices can be monitored website can search for these devices www.shodan.io

Limitations for software and hardware cloud based Software Cloud based Owned and operated by a third party Location (might be a foreign country) Security settings need username and password Rights of access Hardware Cloud based Owned by a third party Rights of access Location (might be in a foreign country) Limitation regarding recovery deleted items

Limitations and issues Chain of custody Privacy issues Cross border issues Ownership issues Repeat the process (if required)

How can Computer Forensics help Tools to help collate the information and put it into a format that is readable, can be investigated and is presentable Identify possible evidence options Potentially save possible electronic information Save time and costs through tools Help preserve and present information for client, court etc (depending on scope of work)

Questions